Invertibility and Largest Eigenvalue of Symmetric Matrix Signings

Size: px
Start display at page:

Download "Invertibility and Largest Eigenvalue of Symmetric Matrix Signings"

Transcription

1 Invertibility and Largest Eigenvalue of Symmetric Matrix Signings Charles Carlson Karthekeyan Chandrasekaran Hsien-Chih Chang Alexandra Kolla Abstract The spectra of signed matrices have played a fundamental role in social sciences, graph theory, and control theory. In this work, we investigate the computational problems of identifying symmetric signings of matrices with natural spectral properties. Our results are twofold: 1. We show NP-completeness for the following three problems: verifying whether a given matrix has a symmetric signing that is positive semi-definite/singular/has bounded eigenvalues. However, we also illustrate that the complexity could substantially differ for input matrices that are adjacency matrices of graphs. 2. We exhibit a stark contrast between invertibility and the above-mentioned spectral properties: we show a combinatorial characterization of matrices with invertible symmetric signings and design an efficient algorithm using this characterization to verify whether a given matrix has an invertible symmetric signing. Next, we give an efficient algorithm to solve the search problem of finding an invertible symmetric signing for matrices whose support graph is bipartite. We also provide a lower bound on the number of invertible symmetric signed adjacency matrices. Finally, we give an efficient algorithm to find a minimum increase in support of a given symmetric matrix so that it has an invertible symmetric signing. We use combinatorial and spectral techniques in addition to classic results from matching theory. Our combinatorial characterization of matrices with invertible symmetric signings might be of independent interest. {ccarlsn2,karthe,hchang17,akolla}@illinois.edu 1

2 1 Introduction The spectra of several graph-related matrices such as the adjacency and the Laplacian matrices have become fundamental objects of study in computer science research. They have had a tremendous impact in several areas including machine learning, data mining, web search and ranking, scientific computing, and computer vision. In this work, we undertake a systematic and comprehensive investigation of the spectrum and the invertibility of symmetric signings of matrices. For a real symmetric n n matrix M and an n n matrix s taking values in {±1} which we refer to as a signing we define the signed matrix M(s) to be the matrix obtained by taking entry-wise products of M and s. We say that s is a symmetric signing if s is a symmetric matrix and an off-diagonal signing if s takes value +1 on the diagonal. Signed adjacency matrices (respectively, Laplacians) correspond to the case where M is the adjacency matrix (respectively, Laplacian) of a graph. Signed adjacency matrices were introduced as early as 1953 by Harary [22], to model social relations involving disliking, indifference, and liking. They have since been used in an array of network applications such as finding balanced groups in social networks where members of the same group like or dislike each other [22] and reaching consensus among a group of competing or cooperative agents [6]. Studies of spectral properties of general signed matrices as well as signed adjacency matrices have led to breakthrough advances in multiple areas such as algorithms [2, 8, 16, 17, 31, 37], graph theory [40, 44, 49, 52], and control theory [10, 28, 38, 41, 45]. In this work, we study natural spectral properties of symmetric signed matrices and address the computational problems of finding/verifying the existence of signings with these spectral properties. We recall that a real symmetric matrix is positive semi-definite (psd) if all its eigenvalues are non-negative. We study the following computational problems: BoundedEvalueSigning: Given a real symmetric matrix M and a real number λ, verify if there exists an off-diagonal symmetric signing s such that the largest eigenvalue λ max (M(s)) is at most λ. PsdSigning: Given a real symmetric matrix M, verify if there exists a symmetric signing s such that M(s) is positive semi-definite. SingularSigning: Given a real symmetric matrix M, verify if there exists an off-diagonal symmetric signing s such that M(s) is singular. InvertibleSigning: Given a real symmetric matrix M, verify if there exists a symmetric signing s such that M(s) is invertible (that is, non-singular). The magnitude of the eigenvalues of symmetric signed adjacency matrices and Laplacians are fundamental to designing expanders [2, 8, 16, 17, 31] and in particular, Ramanujan graphs [37]. Motivated by this application, we examine the problems of finding symmetric signed matrices with bounds on the magnitude of the eigenvalues, that is, BoundedEvalueSigning and PsdSigning. In SingularSigning and InvertibleSigning, we examine the singularity and the invertibility of symmetric signed matrices. Both these properties are completely determined by the determinant. The determinant of signed matrices has a special significance in the computational problems of counting matchings and computing the permanent [40, 44, 49, 52]. In what follows, we elaborate on the motivations behind the above-mentioned decision problems and their search variants, and describe our results. 2

3 1.1 Motivations Spectra of signed matrices and expander graphs. The relation between the expansion of a graph and the second eigenvalue λ 2 of the adjacency matrix of the graph is a well-known fact [5, 12]. The Alon-Boppana bound [39] states that λ 2 2 d 1 o(1) for every d-regular graph. For this reason, graphs with λ 2 2 d 1 are optimal expanders and are called Ramanujan. The construction of Ramanujan graphs by Lubotzky, Philips, and Sarnak [36] was a landmark achievement, giving d-regular graphs with the best possible expansion. However, their construction only produced Ramanujan graphs of certain degrees. Efficient construction of Ramanujan graphs of all degrees remains an important open problem. A combinatorial approach to this problem, initiated by Friedman [16], is to obtain larger Ramanujan graphs from smaller ones while preserving the degree. The smaller starting graph is known as the base graph while the larger graph is known as a lift. A 2-lift H of G is obtained as follows: Introduce two copies of each vertex u of G, say u 1 and u 2, as the vertices of H, and for each edge {u, v} in G, introduce either {u 1, v 2 }, {u 2, v 1 } or {u 1, v 1 }, {u 2, v 2 } as edges of H. There is a simple bijection between 2-lifts and symmetric signed adjacency matrices of G. Furthermore, the eigenvalues of the adjacency matrix of a 2-lift H are given by the union of the eigenvalues of the adjacency matrix of the base graph G (also called the old eigenvalues) and the signed adjacency matrix of G that corresponds to the 2-lift (the new eigenvalues). Marcus, Spielman, and Srivastava [37] showed that there is always a 2-lift of every d-regular bipartite graph whose new eigenvalues satisfy the Ramanujan bound, which by the Alon-Boppana bound is the best possible. An important consequence of Marcus et al. s result is that there is an iterative procedure to obtain bipartite Ramanujan graphs of any degree d: Start with a small d-regular Ramanujan graph (for example, K d,d ), find a 2-lift whose corresponding symmetric signed adjacency matrix has its largest eigenvalue at most 2 d 1, and repeat. However, the result of Marcus et al. is non-constructive and making their result constructive requires an efficient algorithm to solve the sub-problem: find a symmetric signing of a given d-regular graph for which the largest eigenvalue of the signed adjacency matrix is at most 2 d 1. This naturally raises the computational problem of whether there exists an algorithm to find a symmetric signing that minimizes the largest eigenvalue of a given matrix since such an algorithm would also solve the sub-problem. This in turn motivates the need to investigate the computational complexity of the decision variant, namely BoundedEvalueSigning. We note that Cohen [13] gave an efficient algorithm to find bipartite Ramanujan multi-graphs. A main drawback of his algorithm is that it only gives multi-graphs and moreover, it is not based on the above-mentioned lifting operation. It still remains open to efficiently construct bipartite Ramanujan simple graphs of all degrees. If BoundedEvalueSigning is solvable in polynomial time, then it immediately gives such an efficient algorithm (as explained in the paragraph above). Determinant of signed graphs. The determinant of signed adjacency matrices of graphs have been crucial to the study of several fundamental questions concerning graphs and linear systems [40, 44, 49, 52]. We mention two of these questions: Pólya s scheme: Given an adjacency matrix A, is there a signing of A such that the permanent of A equals the determinant of the signed matrix? Sign solvability: Given a real square matrix, is every real matrix with the same sign pattern (that is, the corresponding entries either have the same sign, or are both zero) invertible? Both these questions are known to be equivalent and in particular, closely related to the problem of counting the number of perfect matchings in a given bipartite graph (see the survey by Thomas [49]). The motivation for the above-mentioned questions largely arose from trying to understand the complexity of computing the permanent of a matrix. Pólya [42] suggested the possibility of computing the permanent by somehow reducing the problem to computing the determinant of 3

4 a related matrix: If A is a 0-1 square matrix, under what conditions is there a signed matrix B obtained from A such that the permanent of A equals the determinant of B? In a seminal work, Robertson, Seymour, and Thomas [44] gave a structural characterization of matrices that have this property (which they called Pólya matrices) and presented a polynomial-time algorithm that decides whether a given matrix is a Pólya matrix. In this work we investigate questions concerning the invertibility of symmetric signed matrices. We mention that the signings studied in the related works mentioned in the above paragraph are not necessarily symmetric. Randomized algorithms for perfect matching. We mention yet another motivation to investigate the invertibility of symmetric signed matrices. A well-known algebraic method to verify the existence of a perfect matching in a given bipartite graph G with a bipartition of equal size is by certifying that the determinant of the Edmonds matrix is not identically zero [35]. The Edmonds matrix of G is a matrix M with variables x e for the edges such that M[i, j] := x {i,j} if {i, j} is an edge of G, and M[i, j] = 0 otherwise. Now G has a perfect matching if and only if the polynomial det(m) is not identically zero. A simple way to verify this condition is by substituting uniformly random values into the variables x e from a large enough field F and evaluating the determinant over F. In order for this algorithm to succeed with constant probability, the size of the field is required to be Ω(n), and thus the amount of randomness needed for the algorithm is at least Ω(mn), where n is the number of vertices and m is the number of edges in G. It remains an important open problem to derandomize this method or even reduce the amount of randomness needed. Consider the following variant of this approach. Instead of picking a large field F, substitute uniformly random {±1} values into variables x e and evaluate the determinant of the resulting matrix over the reals. If G has no perfect matching, then the determinant will be zero. In this work, we investigate the probability of such a determinant being non-zero if G has a perfect matching. In particular, we show that the probability is non-zero and moreover, we present a non-trivial lower bound on this probability. Efficient algorithms for finding the solvability index of a signed matrix. The notion of balance of a symmetric signed matrix is crucial to social sciences and has been studied extensively [22, 24, 25, 30]. A signed adjacency matrix is balanced if there is a partition of the vertex set such that all edges within each part are positive, and all edges in between two parts are negative (one of the parts could be empty). A number of works [3, 21, 30, 48, 53, 54] have explored the problem of minimally modifying signed graphs (or signed adjacency matrices) to convert it into a balanced graph. Given a signed matrix M, the frustration index of M is the minimum number of non-zero off-diagonal entries of M whose deletion results in a balanced signed graph [1,23]. A simple reduction from MaxCut shows that computing the frustration index of a signed graph is NP-hard [27]. In this work, we introduce a related problem regarding symmetric signed matrices: Given a symmetric matrix M, what is the smallest number of non-diagonal zero entries of M whose replacement by non-zeroes gives a symmetric matrix M that has an invertible symmetric signing? We define this quantity to be the solvability index of M. Our main motivation is to study systems of linear equations in signed matrices that might be ill-defined, and thus do not have a (unique) solution and to minimally modify such matrices so that the resulting linear system becomes (uniquely) solvable. 1.2 Results Intriguingly, the complexity of BoundedEvalueSigning has not been studied in the literature even though it is widely believed to be a difficult problem in the graph sparsification community. We 4

5 shed light on this problem by showing that it is NP-complete. Owing to the close connection between the maximum eigenvalue, positive semi-definiteness, and singularity (by suitable translations), we obtain that PsdSigning and SingularSigning are also NP-complete. Theorem 1.1. BoundedEvalueSigning, PsdSigning, and SingularSigning are NP-complete. We remark that the hard instances generated by our proof of Theorem 1.1 are real symmetric matrices with non-zero diagonal entries and hence, it does not completely resolve the computational complexity of the problem of finding a signing of a given adjacency matrix that minimizes its largest eigenvalue. However, it gives some indication that the task of making the result by Marcus et al. [37] constructive would require techniques that are very specific to graphs and graph-related matrices and cannot generalize to arbitrary matrices. Our next result provides some evidence that one might be able to design efficient algorithms to solve the NP-complete problems appearing in Theorem 1.1 for graph-related matrices. In particular, we show that SingularSigning and its search variant admit efficient algorithms when the input matrix corresponds to the adjacency matrix of a bipartite graph. Theorem 1.2. There exists a polynomial-time algorithm to verify if the adjacency matrix A G of a given bipartite graph G has a symmetric signing s such that A G (s) is singular and if so, find such a signing. Next, we show a stark difference in complexity between SingularSigning and Invertible- Signing. In contrast to SingularSigning which is NP-complete for arbitrary input matrices (Theorem 1.1), we show that InvertibleSigning is solvable in polynomial time for arbitrary input matrices. Theorem 1.3. There exists a polynomial-time algorithm to solve InvertibleSigning. Our algorithm for solving InvertibleSigning is based on a novel graph-theoretic characterization of symmetric matrices M for which every symmetric signed matrix M(s) is singular. We believe that our characterization might be of independent interest. We describe the characterization now. The support graph of a real symmetric n n matrix M is an undirected graph G where the vertex set of G is {1,..., n}, and the edge set of G is { {u, v} M[u, v] 0 }. We note that G could have self-loops depending on the diagonal entries of M. A perfect 2-matching in a graph G with edge set E is an assignment x : E {0, 1, 2} of values to the edges such that e δ(v) x e = 2 holds for every vertex v in G (where δ(v) denotes the set of edges incident to v). We show the following characterization from which Theorem 1.3 follows immediately. Theorem 1.4. Let M be a symmetric n n matrix and let G be the support graph of M. The following are equivalent: 1. The signed matrix M(s) is singular for every symmetric signing s. 2. The support graph G does not contain a perfect 2-matching. Moreover, there exists a polynomial-time algorithm to verify whether the signed matrix M(s) is singular for every symmetric signing s. 5

6 Remark. For a subset S of vertices in a graph G, let N G (S) be the non-inclusive neighborhood of S, that is, { u V \ S {u, v} is an edge of G for some v in S }. A subset S of vertices is said to be independent if there are no edges between any pair of vertices in S. A subset S of vertices is said to be expanding in G if N G (S) S. Tutte [51] showed that the existence of a non-expanding independent set is equivalent to the absence of perfect 2-matchings in the graph, which in turn has been used in the study of independent sets [4, 11, 50]. Thus, Theorem 1.4 can be interpreted as a spectral characterization of graphs with non-expanding independent sets: a graph contains a non-expanding independent set if and only if every symmetric signed adjacency matrix of the graph is singular. Our next result focuses on the search variant of InvertibleSigning. We mention that our proof of Theorem 1.4 is non-constructive, that is, even if the support graph of the given matrix has a perfect 2-matching, our proof does not lead to an efficient algorithm to find an invertible signing. While we do not have an efficient algorithm for the search problem for arbitrary symmetric matrices, we obtain an efficient algorithm for those whose support graph is bipartite. Theorem 1.5. There exists a polynomial-time algorithm to verify if a given symmetric matrix M, whose support graph is bipartite, has a symmetric signing s such that M(s) is invertible and if so, find such a signing. We next investigate the number of invertible signed adjacency matrices of graphs with perfect 2-matchings. In light of Theorem 1.4, we recall the variant of the randomized algorithm to verify the existence of a perfect matching in a bipartite graph mentioned in Section 1.1: substitute uniformly random {±1} values into variables x e in the Edmonds matrix of G and evaluate the determinant over the reals. Given a graph G with n vertices and m edges, it can be shown that if G has a perfect matching then the determinant will be nonzero with probability at least 2 m using our characterization in Theorem 1.4. We show a much larger lower bound on this probability by obtaining a lower bound on the number of invertible signed adjacency matrices of graphs. It is well-known that flipping the signs on the edges of a cut preserves the spectrum of the signed adjacency matrix. Thus, the existence of one invertible signed adjacency matrix for a (connected) graph G also implies the existence of 2 n 1 invertible signed adjacency matrices. In comparison, the lower bound obtained in our next result is much larger. We emphasize that our lower bound holds for general simple graphs (and not just bipartite graphs). Theorem 1.6. Let G be a simple graph with n vertices and m edges that has at least one perfect 2-matching. Then, the number of invertible signed adjacency matrices of G is at least 2 m n /n!. Theorem 1.6 shows that the fraction of invertible signed adjacency matrices of a graph G containing a perfect 2-matching is at least 2 O(n log n). An upper bound of 2 Ω(n) on the fraction is demonstrated by the graph consisting of disjoint union of 4-cycles. Finally, akin to frustration index, we define the solvability index of a real symmetric matrix M to be the smallest number of non-diagonal zero entries that need to be converted to non-zeroes so that the resulting symmetric matrix has an invertible symmetric signing. We give an efficient algorithm to find the solvability index of a given symmetric matrix M. We emphasize that the support-increase operation that we consider preserves symmetry, that is, if we replace the zero entry A[i, j] by α, then the zero entry A[j, i] is also replaced by α. Theorem 1.7. There exists a polynomial-time algorithm to find the solvability index of a given real symmetric matrix. 6

7 1.3 Organization In Section 1.4, we review definitions and notations. In Section 2, we focus on our results related to invertible signings. This includes the combinatorial characterization of matrices with invertible signings (Theorem 1.4), an efficient algorithm to find an invertible signing of matrices with bipartite support graphs (Theorem 1.5), a lower bound on the number of invertible signed adjacency matrices (Theorem 1.6), and an efficient algorithm to find the solvability index of symmetric matrices (Theorem 1.7). In Section 3, we focus on our results related to singular signings. This includes an efficient algorithm to find a singular signing of adjacency matrices of bipartite graphs (Theorem 1.2), and a proof of NP-completeness of SingularSigning (Lemma 3.4). In Section 4, we complete Theorem 1.1 by showing that PsdSigning and BoundedEvalueSigning are also NP-complete. We conclude by discussing open questions and potential avenues for future research in Section Preliminaries Unless otherwise specified, all matrices are symmetric and take values over the reals. Since all of our results are for symmetric signings, we will just use the term signing to refer to a symmetric signing in the rest of this work. We now introduce some definitions that will be used in multiple sections. A matching is a vertex-disjoint union of edges. Let S n denote the set of permutations of n elements. Then, the permutation expansion of the determinant of a signed matrix M(s) is given by det M(s) = σ S n sgn(σ) n M(s)[i, σ(i)]. For ease of presentation, let us define M σ (s) := sgn(σ) i M(s)[i, σ(i)] and M σ := M σ (J), where J is the signing corresponding to all entries being +1. A permutation σ in S n has a unique cycle decomposition and hence corresponds to a vertex disjoint union of directed cycles and self-loops on n vertices. Removing the orientation gives an undirected graph which is a vertex disjoint union of cycles of length at least three, matching edges, and self-loops. We use the notion of Schur complement repeatedly. The following lemma summarizes the definition and the relevant properties of the Schur complement. Lemma 1.8 (Horn and Johnson [26]). Suppose A R p p, B R p q, C R q q are matrices such that A is invertible and the matrix [ ] A B D := B T C is a symmetric matrix. Then the Schur complement of C in matrix D is defined to be We have the following properties: i=1 D C := C BA 1 B T. (i) Suppose A is positive definite. Then, D is positive semi-definite if and only if the Schur complement of C in D, namely D C, is positive semi-definite. (ii) det(d) = det(a) det(d C ). 2 Invertible Matrices In this section, we focus on invertible signings and prove Theorems 1.4, 1.5, 1.6, and

8 2.1 Matrices with Invertible Signings In this section, we present a characterization of symmetric matrices M for which every symmetric signed matrix M(s) is singular by proving Theorem 1.4. We start by defining the notation. We recall that a permutation σ in S n has a unique cycle decomposition and corresponds to a vertex disjoint union of directed cycles and self-loops on n vertices. Moreover, removing the orientation gives an undirected graph which is a vertex disjoint union of cycles of length at least three, matching edges, and self-loops. Let the collection of (undirected) edges in the cycle components, matching components, and self-loop components in the resulting undirected graph be denoted by Cycles(σ), Matchings(σ), and Loops(σ) respectively. We observe that sgn(σ) is the parity of the sum of the number of matching edges and the number of even-length cycles (cycles with even number of edges) in the undirected subgraph induced by the edges in Cycles(σ) Matchings(σ). For a matrix M and a signing s, we define M Cycles (σ, s) := M(s)[u, v], M Matchings (σ, s) := M Loops (σ, s) := {u,v} Cycles(σ) {u,v} Matchings(σ) {u,u} Loops(σ) M(s)[u, v] 2, and M(s)[u, u]. We use the convention that a product over an empty set is equal to 1. With this notation, we have M σ (s) = sgn(σ) M Cycles (σ, s) M Matchings (σ, s) M Loops (σ, s). The following lemma is the core of our proof of Theorem 1.4. Lemma 2.1. Let M be a symmetric n n matrix. Then M σ = 0 holds for every permutation σ in S n if and only if the signed matrix M(s) is singular for all signing s. Proof. The forward implication follows immediately: If M σ = 0 for every permutation σ in S n, then for every signing s, M σ (s) = 0 for every permutation σ in S n. Hence, every term in the permutation expansion of the determinant of M(s) is zero for every signing s. We now show the reverse implication. By assumption, M(s) is singular for all signings s: det(m(s)) = σ S n M σ (s) = 0. Assume for contradiction that there is a permutation τ such that M τ 0. Let Γ be a minimum cardinality subset of permutations in S n such that (i) τ Γ and (ii) σ Γ M σ(s) = 0 for all signings s. We observe that such a set Γ exists since S n is a valid choice for Γ. The following claim, which we prove later, shows that the cycles and the self-loops of all permutations in Γ coincide with that of τ. Claim 2.2. For every permutation σ in Γ, we have Cycles(σ) = Cycles(τ) and Loops(σ) = Loops(τ). 8

9 Now we show that Lemma 2.1 follows from the claim. Let us fix a permutation σ in Γ. By Claim 2.2, we have Cycles(σ) = Cycles(τ) and Loops(σ) = Loops(τ). Furthermore, Claim 2.2 also implies that the number of matching edges in σ and τ is the same and hence, sgn(σ) = sgn(τ). So we have M σ (s) = sgn(σ) M Cycles (σ, s) M Matchings (σ, s) M Loops (σ, s) = sgn(τ) M Cycles (τ, s) M Matchings (σ, s) M Loops (τ, s) ( ) MMatchings (σ, s) = M τ (s). M Matchings (τ, s) Using the above expression and taking the sum of the terms M σ (s) over all σ in Γ, we have ( ) M τ (s) M σ (s) = M Matchings (τ, s) M Matchings (σ, s). σ Γ σ Γ By the choice of τ, we know that M τ (s)/m Matchings (τ, s) is non-zero. Moreover, M Matchings (σ, s) is a perfect square and therefore non-negative for all permutations σ in Γ. In particular, since τ is in Γ, we have that Γ is non-empty and hence, M Matchings (σ, s) 0. σ Γ Consequently, the sum σ Γ M σ(s) is non-zero, contradicting condition (ii) in the choice of Γ. We now prove Claim 2.2. Proof of Claim 2.2. Let us consider an arbitrary permutation τ Γ\{τ}. Assume for contradiction that there is an edge e in the symmetric difference of Cycles(τ) Loops(τ) and Cycles(τ ) Loops(τ ). Partition Γ into two subsets Γ e and Γ e, where Γ e contains any permutation σ in Γ that has the edge e in the subgraph induced by the edges in Cycles(σ) Loops(σ), and Γ e := Γ\Γ e. By this partitioning, for every permutation σ Γ e, either e Matchings(σ ) or e Cycles(σ ) Matchings(σ ) Loops(σ ) holds. We also observe that exactly one of the permutations τ and τ is in Γ e while the other is in Γ e. In particular, both Γ e and Γ e are nonempty. We will show that either Γ e or Γ e contradicts the minimality of Γ. Let us consider an arbitrary signing s, and let s be another signing that is obtained from s by flipping the sign only on edge e. Consider the following four sums: Σ 00 := σ Γ e M σ (s), Σ 01 := σ Γ e M σ (s ), Σ 10 := σ Γ e M σ (s), Σ 11 := σ Γ e Now, by condition (ii) in the choice of Γ, we have that M σ (s ). Σ 00 + Σ 10 = 0, (1) Σ 01 + Σ 11 = 0. (2) For every σ in Γ e, we have that M σ (s) = M σ (s ) since the edge e = {u, v} is in the subgraph induced by the edges in Cycles(σ) Loops(σ) and hence exactly one of the two terms M(s)[u, v] and M(s)[v, u] appears in M σ (s). Therefore, Σ 00 = Σ 01. (3) 9

10 For every σ in Γ e, we have that M σ (s) = M σ (s ) since we have either e Matchings(σ ) or e Matchings(σ ) Cycles(σ ) Loops(σ ) holds and in both cases, an even number of terms among M(s)[u, v] and M(s)[v, u] appear in M σ (s). Therefore, Σ 10 = Σ 11. (4) By equations (1), (2), (3), and (4), we have that Σ 00 = Σ 01 = Σ 10 = Σ 11 = 0 for every signing s. Now, let us take T to be the set in {Γ e, Γ e} that contains τ. We obtain that (i) τ T and (ii) σ T M σ(s) = 0 for every signing s. Moreover T < Γ, contradicting the minimality of Γ. Remark. Lemma 2.1 can also be shown using the DeMillo-Lipton-Schwartz-Zippel lemma [14, 47, 55] by exploiting the low-degree nature of the multivariate determinant polynomial. We avoid presenting the alternative proof in the interest of brevity. To complete the proof of Theorem 1.4, we use the following lemma about the complexity of verifying the existence of a perfect 2-matching in a given graph. The lemma follows from a well-known reduction to the perfect matching problem in bipartite graphs. Lemma 2.3 (Tutte [51]; Lovász and Plummer [34, Corollary 6.1.5]). There exists a polynomial-time algorithm to verify if a given graph (possibly with loops) has a perfect 2-matching. We now prove Theorem 1.4. Proof of Theorem 1.4. By Lemma 2.1, the signed matrix M(s) is singular for every signing s if and only if M σ = 0 holds for every permutation σ in S n. The existence of a perfect 2-matching in the support graph of M is equivalent to the fact that M σ 0 for some σ in S n, and therefore we have that M σ = 0 for every σ in S n if and only if the support graph of M has no perfect 2-matchings. Moreover, Lemma 2.3 immediately gives us a polynomial-time algorithm to verify whether the signed matrix M(s) is singular for every signing s. 2.2 Finding Invertible Signings of Bipartite Graphs In this section, we present an algorithm to find an invertible signing of the adjacency matrix of a given bipartite graph and thus prove Theorem 1.5. We say that a signing s extends another signing s on entry (u, v) if s [i, j] = s[i, j] for every entry (i, j) {(u, v), (v, u)}. Thus, if s extends a signing s on entry (u, v), then s could be s or it differs from s only in the entry corresponding to u th row and v th column (and by symmetry, the entry corresponding to v th row and u th column). We now have the ingredients to show that incrementing a signing while preserving invertibility is possible. Lemma 2.4 (Incremental Signing). Let G be a bipartite graph with bipartition (L, R) of the vertex set, and let A G be the adjacency matrix of G. Suppose there exists a signing s such that A G (s) is invertible. Let l L, r R be vertices in G such that e := {l, r} is not an edge of G. Then there exists a signing s that extends s on (l, r) such that A G+e (s ) is invertible, where G + e is the graph obtained by adding the edge e to G. Proof. Let n be the number of vertices in G. Let s be a signing such that A G (s) is invertible. Let s be an n n matrix where s [i, j] = s[i, j] for all pairs of (i, j) besides (l, r) and (r, l), and set s [l, r] (and thus by symmetry, s [r, l]) to be a variable x. Let b l and b r be vectors of length n 2 such that b l [i] = A G (s )[l, i] and b r [i] = A G (s )[r, i] for every i not equal to l or r. For a subgraph G of 10

11 G with adjacency matrix A G, let A G (s) denote the signed adjacency matrix of G obtained by the entry-wise product of A G and the signing obtained by projecting s to the edges of G. Consider the matrix A G+e (s ) obtained by taking entry-wise product of A G+e and s. Let H be the graph obtained by removing vertices r and l from G, and let A H be the adjacency matrix of H. In the notation defined, we have 0 x b l A G+e (s ) = x 0 b r b T l b T r A H (s) with the first and second rows (by symmetry, columns) corresponding to vertices l and r respectively. Let f(x) := det(a G+e (s )). We have that ([ ]) f(x) = det (A H (s)) x 2 0 br det b T x + det (A l A H (s) G (s)). We note that f(x) is a quadratic function of x. Now suppose for the sake of contradiction that the matrix A G+e (s ) is singular for both x = ±1. Then f(1) = f( 1) = 0 and hence the following holds. ([ ]) 0 br det b T = 0 l A H (s) (5) det(a H (s)) = det(a G (s)) (6) We recall that det(a G (s)) 0 and hence det(a H (s)) 0 by equation (6). Since det(a H ) 0, we use the property of the Schur complement (Lemma 1.8) to obtain that ( det(a G (s)) = det(a H (s)) det 0 Using equation (6), we thus have [ bl b r ] A H (s) 1 [ b T l b T r ] ) ([ bl A = det(a H (s)) det H (s) 1 b T l b l A H (s) 1 b T r b r A H (s) 1 b T l b r A H (s) 1 b T r ]). ([ bl A det H (s) 1 b T l b l A H (s) 1 b T ]) r b r A H (s) 1 b T l b r A H (s) 1 b T = 1. (7) r Let G l and G r be the graphs obtained by removing vertices l and r from G respectively. Then by applying the Schur complement on A G r (s) (Lemma 1.8), we have that and hence Similarly, we also have ([ ]) 0 br det(a G r (s)) = det b T = det(a r A H (s) H (s)) det(0 b r A H (s) 1 b T r ), (8) det(a G r (s)) = det(a H (s)) b r A H (s) 1 b T r. (9) det(a G l (s)) = det(a H (s)) b l A H (s) 1 b T l. (10) 11

12 Moreover, by equation (5) and the property of Schur complement (Lemma 1.8), we have that ([ ]) 0 br 0 = det = det(a A H (s) H (s)) det(0 b r A H (s) 1 b T l ). Hence, b T l b r A H (s) 1 b T l = 0. (11) Similarly, we also have Thus, using equations (9), (10), (11), and (12), we have ([ bl A det H (s) 1 b T l b l A H (s) 1 b T ]) r b r A H (s) 1 b T l b r A H (s) 1 b T = det(a G r(s)) r det(a H (s)) b l A H (s) 1 b T r = 0. (12) det(a G l(s)) det(a H (s)). (13) However, since G is bipartite and has a perfect 2-matching, the subgraphs G r and G l must be bipartite and have an odd number of vertices. Hence, the subgraphs G r and G l have no perfect 2-matching. Thus, by Lemma 2.3 and the backward direction of Theorem 1.4, we have det(a G r (s)) = det(a G l (s)) = 0 which together with equation (13) contradicts equation (7). FindInvertibleSigningBipartite(G): Input: A bipartite graph G. 1. Find a perfect matching M in G. 2. Let H be the subgraph of G with edge set M. 3. Let s be the all-one signing. 4. While G H: 4.1. Let e := {l, r} be an edge in G but not in H Find a signing s that extends s on (l, r) such that A H+e (s ) is invertible Update s s and H H + e. 5. Return s. Figure 2.1: The algorithm FindInvertibleSigningBipartite(G). Lemma 2.4 suggests a natural algorithm to find an invertible signing of the adjacency matrix of a given bipartite graph in polynomial time that is presented in Figure 2.1. The correctness of the algorithm follows from Lemma 2.4. It can be implemented to run in polynomial time since a perfect matching in a bipartite graph can be found efficiently and moreover, Step 4.2 only requires us to consider the determinant of the signed adjacency matrix of H + e for the two possible signings s that extend s on (l, r) (where the two extensions are obtained by signing the edge e as ±1). This completes the proof of Theorem 1.5. Our algorithm also gives an alternative constructive proof of Theorem 1.4 for matrices whose support graph is bipartite. 2.3 Number of Invertible Signings In this section, we show a lower bound on the number of invertible signings of adjacency matrices of graphs with at least one perfect 2-matching, thus proving Theorem 1.6. Proof of Theorem 1.6. Let A denote the adjacency matrix of G while n and m be the number of vertices and edges in G respectively. For a vector s {±1} E(G) that gives a sign for the edges of G, we define A(s) to be the signed adjacency matrix of G obtained by taking the entry-wise product 12

13 of A and the n n symmetric signing whose entry on (i, j) (and by symmetry, (j, i)) is s({i, j}) if {i, j} is an edge in G, and +1 otherwise. We will abuse notation for the purposes of this proof only and call such a vector s to be a signing of the graph G. Let { } Γ 1 := s {±1} E(G) A(s) is invertible, and { } Γ 0 := s {±1} E(G) A(s) is singular. For a signing s of G in Γ 0, we have ω S n A ω (s) = 0. Assume for the sake of contradiction that the set Γ 1 has size less than 2 m n /n!. By assumption there is a perfect 2-matching in G. Hence there exists a permutation τ S n for which A τ 0 and hence A τ {±1}. Fix a permutation τ S n with the least number of cycles and loops for which A τ 0 (i.e., the perfect 2-matching corresponding to τ having the largest number of matching edges). Let Ω 0 := {σ S n : Cycles(σ) = Cycles(τ) and Loops(σ) = Loops(τ)}. Then for every σ in Ω 0 and every signing s, we have A σ (s) = A τ (s). Now let { } R := s {±1} E(G) s(e) = +1 for every edge e in Cycles(τ) and Loops(τ). Consider the absolute value of double-sum A ω (s). s R ω S n We have the upper bound A ω (s) = s R ω S n s R Γ 1 A ω (s) ω S n n! Γ 1 n! < 2 m n. s R Γ 1 Now we will show a lower bound to the double-sum that contradicts the upper bound. We first note that A ω (s) = A ω (s) + A ω (s). s R ω S n s R ω Ω 0 s R ω S n\ω 0 Since τ is chosen to have the fewest number of cycles and loops, it follows that any permutation in S n \ Ω 0 has at least one cycle or loop edge that is not in τ, which implies that the signings in R can be paired up such that each pair of signings differ only on that specific edge not in τ. Therefore for each permutation ω S n \ Ω 0, we have A ω (s) = 0. s R Hence, s R ω S n\ω 0 A ω (s) = 0. 13

14 Now fix any s 0 R and we have A ω (s) = A ω (s) s R ω S n s R ω Ω 0 = R Ω 0 A τ (s 0 ) R. The second equation above is because A ω (s) = A τ (s 0 ) for every ω Ω 0 and every s R. The last inequality above is because τ Ω 0 and hence Ω 0 1 and moreover, A τ (s 0 ) {±1}. Thus the cardinality of R is a lower bound for the absolute value of the double-sum of interest. Now we note that R is the set of all signings on edges for which s(e) = +1 on every edge e in Cycles(τ) Loops(τ). The total number of edges in Cycles(τ) Loops(τ) is at most n and hence R 2 m n. Thus, we have A ω (s) R 2m n, s R ω S n a contradiction to the upper bound on the absolute value of the double-sum. We note that the above proof of Theorem 1.6 can also be adapted to obtain an alternative proof of Theorem Minimum Support Increase to Obtain an Invertible Signing In this section, we study the problem of computing the solvability index of real symmetric matrices, thus proving Theorem 1.7. We recall the following definition: For a real symmetric matrix M, the solvability index of M is the smallest number of non-diagonal zero entries that need to be converted to non-zeroes so that the resulting symmetric matrix has an invertible signing. We remind the reader that the support-increase operation preserves symmetry. By our characterization in Theorem 1.4, computing the solvability index of a matrix reduces to the following edge addition problem: EdgeAdd: Given a graph G (possibly with self-loops) with vertex set V and edge set E, find min { F F is a set of non-edges of G with no loops such that G + F has a perfect 2-matching }. In the above, G + F denotes the graph obtained by adding the edges in F to G. In the rest of the section, we will show that EdgeAdd can be solved efficiently, which will imply Theorem 1.7. Theorem 2.5. There is a polynomial-time algorithm to solve EdgeAdd. We need some terminology from matching theory. Let G be a graph on vertex set V and edge set E. For a subset S of vertices, denote the induced subgraph of G on S as G[S] and the non-inclusive neighborhood of S in G by N G (S). We recall that a matching M in G is a subset of edges where each vertex is incident to at most one edge in M. Let ν(g) denote the cardinality of a maximum matching in G and let ν f (G) := max x e x e 1, and x e 0 for all e E e E e δ(v) denote the value of a maximum fractional matching in G. For a matching M, we define a vertex u to be M-exposed if none of the edges of M are incident to u, and a vertex v to be an M-neighbor of u 14

15 if edge {u, v} is in M. A vertex u in V is said to be inessential if there exists a maximum cardinality matching M in G such that u is M-exposed, and is said to be essential otherwise. A graph H is factor-critical if there exists a perfect matching in H v for every vertex v in H. The following result is an immediate consequence of the odd-ear decomposition characterization of Lovász [33]. Lemma 2.6 (Lovász [33]). If G is a factor-critical graph, then G has a perfect 2-matching. The Gallai-Edmonds decomposition [15, 18, 19] of a graph G is a partition of the vertex set of G into three sets (B, C, D), where B is the set of inessential vertices, C := N G (B), and D := V \(B C). Let B 1 denote the set of isolated vertices in G[B] and B 3 := B \ B 1. For notational convenience, we will denote the Gallai-Edmonds decomposition as (B = (B 1, B 3 ), C, D). The Gallai-Edmonds decomposition of a graph is unique and can be found efficiently [15]. The following theorem summarizes the properties of the Gallai-Edmonds decomposition that we will be using (properties (i) and (ii) are well-known and can be found in Schrijver [46] while property (iii) follows from results due to Balas [7] and Pulleyblank [43] see Bock et al. [9] for a proof of property (iii)): Theorem 2.7. Let (B = (B 1, B 3 ), C, D) be the Gallai-Edmonds decomposition of a graph G. We have the following properties: (i) Each connected component in G[B] is factor-critical. (ii) Every maximum matching M in G contains a perfect matching in G[D] and matches each vertex in C to distinct components in G[B]. (iii) Let M be a maximum matching that matches the largest number of B 1 vertices. Then there are 2(ν f (G) ν(g)) M-exposed vertices in B 3. We observe that G contains a perfect 2-matching if and only if ν f (G) = V /2. Therefore, adding edges to get a perfect 2-matching in G is equivalent to adding edges to increase the maximum fractional matching value to V /2. Proof of Theorem 2.5. We will assume that G has no isolated vertices and no self-loops in the rest of the proof. We make this assumption here in order to illustrate the main idea underlying the algorithm. This assumption can be relaxed by a case analysis in the algorithm as well as the proof of correctness. We defer the details of the case analysis to the full-version of the paper. EdgeAdd(G): Input: A graph G with no isolated vertices and no self-loops. 1. Find the Gallai-Edmonds decomposition (B = (B 1, B 3 ), C, D) of G. 2. Find a maximum matching M that matches the largest number of B 1 vertices. 3. Let S := {u B 1 u is M-exposed}. 4. If S is even: Pick an arbitrary pairing of the vertices in S. 5. If S is odd: Consider a vertex s in S, pick a vertex t in N G (s) and let u be the M-neighbor of t. Pair up u with s and pick an arbitrary pairing of the vertices in S \ {s}. 6. Return the set of pairs F. Figure 2.2: The algorithm EdgeAdd(G). We use the algorithm EdgeAdd(G) given in Figure 2.2. We briefly describe an efficient implementation for Step 2, since it is easy to see that other steps can be implemented efficiently. In order to find a maximum matching that matches the largest number of B 1 vertices (as mentioned in property (iii) of Theorem 2.7), we first find the Gallai-Edmonds decomposition and a maximum 15

16 matching M. Then, we repeatedly augment M by searching for M-alternating paths (of evenlength) from M-exposed B 1 vertices. This approach can be implemented to run in polynomial time. Alternatively, Step 2 can also be implemented by solving a maximum weight matching with suitably chosen weights. We now argue the correctness of the algorithm. We first show that if S is odd, then there is a choice of vertices t and u as described in the algorithm EdgeAdd(G): this is because, G has no isolated vertices and hence there exists a vertex t in N G (s). Moreover, by Theorem 2.7, since s is in B 1, it follows that t is in C and thus t is matched by M to a node u in B. Now, Claim 2.8 proves feasibility and bounds the size of the returned solution F while Claim 2.9 proves the optimality. Claim 2.8. The algorithm EdgeAdd(G) returns a set F of non-edges of G such that (1) G + F contains a perfect 2-matching, and (2) F = V /2 ν f (G). Proof. By property (ii) of Theorem 2.7, the set F is a set of non-edges of G. We will construct a perfect 2-matching in G + F. By property (i) of Theorem 2.7, every component in G[B 3 ] is factor-critical. By Lemma 2.6, every component K in G[B 3 ] contains a perfect 2-matching x K. Let N K denote the support of x K. Let K denote the components in G[B 3 ] that contain an M-exposed vertex. We have two cases: Case 1: Suppose S is even. Let N denote the set of edges of M that do not match any vertices in K K V (K). Now, the set of edges induced by ( K K N K) N F has a perfect 2-matching. A perfect 2-matching x in G + F can be obtained by assigning x(e) := x K (e) for edges e in K K N K, x(e) := 2 for edges e in N F, and x(e) := 0 for the remaining edges in G + F. Case 2: Suppose S is odd. Let N denote the set of edges of M \ {{t, u}} that do not match any vertices in K K V (K). Now, ( K K N K) N (F \ {s, u}) {{t, u}, {s, t}, {s, u}} has a perfect 2-matching. We note that the edges {t, u}, {s, t} were already present in the graph owing to the choice of c and u while the edge {s, u} was added as an edge from F. A perfect 2-matching x in G + F can be obtained by assigning x(e) := x K (e) for edges e K K N K, x(e) := 1 for edges e in {{t, u}, {s, t}, {s, u}}, x(e) := 2 for edges e in N (F \ {s, u}), and x(e) := 0 for the remaining edges in G + F. Next we find the size of the set F returned by the algorithm. We observe that F = S /2. It remains to bound S. For this, we count the number of vertices in the graph using the matched and exposed vertices. We have that V = 2 M + S + {number of M-exposed vertices in B 3 }. By property (iii) of Theorem 2.7 and the choice of the matching M, we have V = 2 M + S + 2(ν f (G) ν(g)). Since M is a maximum cardinality matching, we know that M = ν(g) and hence, S = V 2ν f (G). Our next claim shows a lower bound on the optimal solution that matches the upper bound and hence proves the optimality of the returned solution. Claim 2.9. Let F be a set of non-edges of G. Suppose G + F has a perfect 2-matching. Then F V /2 ν f (G). Proof. We first note that the addition of a non-edge can increase the value of the maximum fractional matching by at most one. That is, for every graph H and every non-edge e of H, we have ν f (H + e) ν f (H) 1 (this can be shown by considering the dual problem, namely the minimum 16

17 fractional vertex cover). Now, consider an arbitrary ordering of the edges in the solution F and let F i denote the set of first i edges according to this order and let F 0 =. Then, F ν f (G + F ) ν f (G) = (ν f (G + F i ) ν f (G + F i 1 )) F. i=1 Thus, we have F ν f (G + F ) ν f (G). We observe that if G + F has a perfect 2-matching, then ν f (G + F ) = V /2. Hence, F V /2 ν f (G). Finally, we observe that F has to be an integer and hence, F V /2 ν f (G). 3 Singular Matrices In this section, we focus on singular signings. We will prove that SingularSigning is NP-complete which will be used to complete the proof of Theorem 1.1 in Section 4, and Theorem Finding Singular Signings of Bipartite Graphs In this section, we characterize bipartite graphs whose signed adjacency matrix is invertible for all signings. We use this characterization to prove Theorem 1.2. We will use the following results by Little [32] for our characterization. (Lemma 3.1 is a slight extension to the original result by Little. We include its proof in the appendix for the sake of completeness. See Section A.1.) Lemma 3.1 (Little [32]). Let G be a graph with adjacency matrix A G. Then det(a G (s)) is even for all signings s if and only if G has an even number of perfect matchings. Theorem 3.2 (Little [32]). Let G be a graph. Then G has an even number of perfect matchings if and only if there is a set S V (G) such that every vertex in G has even number of neighbors in S. Moreover, if G has an even number of perfect matchings, then such a set S can be found in polynomial time. We now have the ingredients to characterize bipartite graphs whose signed adjacency matrix is invertible for all signings. Lemma 3.3. Let G be a bipartite graph and let A G be the adjacency matrix of G. Then G has an odd number of perfect matchings if and only if det(a G (s)) 0 for all signings s. Proof. Suppose G has an odd number of perfect matchings. By Lemma 3.1, we have that det(a G (s)) 0 for all signings s. Now suppose that G has an even number of perfect matchings. By Theorem 3.2, there exists a set S V (G) such that N G (v) S is even for all v V (G). We observe that the subgraph G[S] induced by S is bipartite with every vertex having even degree. Thus, any closed walk on G[S] has even number of edges and every connected component in G[S] has an Eulerian tour with even number of edges. Let C be a connected component of G[S] with m edges and let T := (e 1, e 2,..., e m ) be an ordering of the edges that represents an Eulerian tour of C. Then we sign edge e i to be positive if i is even and negative otherwise. Every vertex v V (G) \ S has even number of edges between v and vertices in S. We partition the edges incident to v into two arbitrary parts of equal size and sign all the edges in one part to be positive and the rest of the edges in the other part to be negative. Let ŝ denote the resulting signing. Under the signing ŝ every vertex v of G has an equal number of positive and negative edges to vertices in S. Thus, the sum of the column vectors corresponding to the vertices in S will be zero and hence det(a G (ŝ)) = 0. 17

18 We note that the proof of Lemma 3.3 is constructive since we can find a set S for which every vertex has even number of neighbors in S in polynomial time by Theorem 3.2. Thus, Theorem 1.2 follows from Theorem 3.2 and Lemma Hardness of Singular Signing Problem In order to show the NP-completeness result, we reduce from the partition problem, which is a well-known NP-complete problem [29]. We recall the problem below: Partition: Given an n-dimensional vector b of non-negative integers, determine if there is a ±1-signing vector z such that the inner product b, z equals zero. Lemma 3.4. SingularSigning is NP-complete. Proof. SingularSigning is in NP since if there is an (off-diagonal) signing of the given matrix that is positive semi-definite or singular, then this signing gives the witness. In particular, we can verify if a given (off-diagonal) symmetric signed matrix is positive semi-definite or singular in polynomial time by computing its spectrum [20]. We show NP-hardness of SingularSigning by reducing from Partition. Let the n-dimensional vector b := (b 1,..., b n ) T be the input to Partition, where each b i is a non-negative integer. We construct a matrix M as an instance of SingularSigning as follows: Consider the following (n + 2) (n + 2)-matrix I n b 1 n M := b T b, b 0, 1 T n 0 n where I n is the n n identity matrix and 1 n is the n-dimensional column vector of all ones. Claim 3.5 proves the correctness of the reduction to SingularSigning. Claim 3.5. The matrix M has a symmetric off-diagonal signing s such that M(s) is singular if and only if there is a vector z {±1} n such that the inner product b, z is zero. Proof. Construct the Schur complement M C of C of M as in Claim 4.2. Using property (ii) of Lemma 1.8, we have that ([ ]) det M = det(i n ) det(m C) 0 ˆb, z = det(i n ) det ˆb, z 0 = ˆb, z 2. Therefore, det M = 0 if and only if ˆb, z = 0. We note that ˆb, z = 0 if and only if there is a ±1-vector z such that b, z = 0. 4 Hardness of Eigenvalue Problems In this section we prove that PsdSigning and BoundedEvalueSigning are NP-complete. Together with Lemma 3.4 this completes the proof of Theorem

Advanced Combinatorial Optimization Feb 13 and 25, Lectures 4 and 6

Advanced Combinatorial Optimization Feb 13 and 25, Lectures 4 and 6 18.438 Advanced Combinatorial Optimization Feb 13 and 25, 2014 Lectures 4 and 6 Lecturer: Michel X. Goemans Scribe: Zhenyu Liao and Michel X. Goemans Today, we will use an algebraic approach to solve the

More information

On the adjacency matrix of a block graph

On the adjacency matrix of a block graph On the adjacency matrix of a block graph R. B. Bapat Stat-Math Unit Indian Statistical Institute, Delhi 7-SJSS Marg, New Delhi 110 016, India. email: rbb@isid.ac.in Souvik Roy Economics and Planning Unit

More information

arxiv: v1 [cs.ds] 2 Oct 2018

arxiv: v1 [cs.ds] 2 Oct 2018 Contracting to a Longest Path in H-Free Graphs Walter Kern 1 and Daniël Paulusma 2 1 Department of Applied Mathematics, University of Twente, The Netherlands w.kern@twente.nl 2 Department of Computer Science,

More information

A short course on matching theory, ECNU Shanghai, July 2011.

A short course on matching theory, ECNU Shanghai, July 2011. A short course on matching theory, ECNU Shanghai, July 2011. Sergey Norin LECTURE 3 Tight cuts, bricks and braces. 3.1. Outline of Lecture Ear decomposition of bipartite graphs. Tight cut decomposition.

More information

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex

More information

1 Matchings in Non-Bipartite Graphs

1 Matchings in Non-Bipartite Graphs CS 598CSC: Combinatorial Optimization Lecture date: Feb 9, 010 Instructor: Chandra Chekuri Scribe: Matthew Yancey 1 Matchings in Non-Bipartite Graphs We discuss matching in general undirected graphs. Given

More information

Formalizing Randomized Matching Algorithms

Formalizing Randomized Matching Algorithms Formalizing Randomized Matching Algorithms Stephen Cook Joint work with Dai Tri Man Lê Department of Computer Science University of Toronto Canada The Banff Workshop on Proof Complexity 2011 1 / 15 Feasible

More information

Parity Versions of 2-Connectedness

Parity Versions of 2-Connectedness Parity Versions of 2-Connectedness C. Little Institute of Fundamental Sciences Massey University Palmerston North, New Zealand c.little@massey.ac.nz A. Vince Department of Mathematics University of Florida

More information

The Strong Largeur d Arborescence

The Strong Largeur d Arborescence The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

Graph Sparsification III: Ramanujan Graphs, Lifts, and Interlacing Families

Graph Sparsification III: Ramanujan Graphs, Lifts, and Interlacing Families Graph Sparsification III: Ramanujan Graphs, Lifts, and Interlacing Families Nikhil Srivastava Microsoft Research India Simons Institute, August 27, 2014 The Last Two Lectures Lecture 1. Every weighted

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets

More information

Topics in Graph Theory

Topics in Graph Theory Topics in Graph Theory September 4, 2018 1 Preliminaries A graph is a system G = (V, E) consisting of a set V of vertices and a set E (disjoint from V ) of edges, together with an incidence function End

More information

Combinatorial Optimization

Combinatorial Optimization Combinatorial Optimization 2017-2018 1 Maximum matching on bipartite graphs Given a graph G = (V, E), find a maximum cardinal matching. 1.1 Direct algorithms Theorem 1.1 (Petersen, 1891) A matching M is

More information

Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5

Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5 Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 5 Instructor: Farid Alizadeh Scribe: Anton Riabov 10/08/2001 1 Overview We continue studying the maximum eigenvalue SDP, and generalize

More information

Kernels of Directed Graph Laplacians. J. S. Caughman and J.J.P. Veerman

Kernels of Directed Graph Laplacians. J. S. Caughman and J.J.P. Veerman Kernels of Directed Graph Laplacians J. S. Caughman and J.J.P. Veerman Department of Mathematics and Statistics Portland State University PO Box 751, Portland, OR 97207. caughman@pdx.edu, veerman@pdx.edu

More information

Strongly chordal and chordal bipartite graphs are sandwich monotone

Strongly chordal and chordal bipartite graphs are sandwich monotone Strongly chordal and chordal bipartite graphs are sandwich monotone Pinar Heggernes Federico Mancini Charis Papadopoulos R. Sritharan Abstract A graph class is sandwich monotone if, for every pair of its

More information

MINIMALLY NON-PFAFFIAN GRAPHS

MINIMALLY NON-PFAFFIAN GRAPHS MINIMALLY NON-PFAFFIAN GRAPHS SERGUEI NORINE AND ROBIN THOMAS Abstract. We consider the question of characterizing Pfaffian graphs. We exhibit an infinite family of non-pfaffian graphs minimal with respect

More information

On improving matchings in trees, via bounded-length augmentations 1

On improving matchings in trees, via bounded-length augmentations 1 On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical

More information

RECAP How to find a maximum matching?

RECAP How to find a maximum matching? RECAP How to find a maximum matching? First characterize maximum matchings A maximal matching cannot be enlarged by adding another edge. A maximum matching of G is one of maximum size. Example. Maximum

More information

1 Perfect Matching and Matching Polytopes

1 Perfect Matching and Matching Polytopes CS 598CSC: Combinatorial Optimization Lecture date: /16/009 Instructor: Chandra Chekuri Scribe: Vivek Srikumar 1 Perfect Matching and Matching Polytopes Let G = (V, E be a graph. For a set E E, let χ E

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh June 2009 1 Linear independence These problems both appeared in a course of Benny Sudakov at Princeton, but the links to Olympiad problems are due to Yufei

More information

THE MINIMALLY NON-IDEAL BINARY CLUTTERS WITH A TRIANGLE 1. INTRODUCTION

THE MINIMALLY NON-IDEAL BINARY CLUTTERS WITH A TRIANGLE 1. INTRODUCTION THE MINIMALLY NON-IDEAL BINARY CLUTTERS WITH A TRIANGLE AHMAD ABDI AND BERTRAND GUENIN ABSTRACT. It is proved that the lines of the Fano plane and the odd circuits of K 5 constitute the only minimally

More information

Advanced Combinatorial Optimization September 22, Lecture 4

Advanced Combinatorial Optimization September 22, Lecture 4 8.48 Advanced Combinatorial Optimization September 22, 2009 Lecturer: Michel X. Goemans Lecture 4 Scribe: Yufei Zhao In this lecture, we discuss some results on edge coloring and also introduce the notion

More information

Eigenvalues, random walks and Ramanujan graphs

Eigenvalues, random walks and Ramanujan graphs Eigenvalues, random walks and Ramanujan graphs David Ellis 1 The Expander Mixing lemma We have seen that a bounded-degree graph is a good edge-expander if and only if if has large spectral gap If G = (V,

More information

Packing and Covering Dense Graphs

Packing and Covering Dense Graphs Packing and Covering Dense Graphs Noga Alon Yair Caro Raphael Yuster Abstract Let d be a positive integer. A graph G is called d-divisible if d divides the degree of each vertex of G. G is called nowhere

More information

Out-colourings of Digraphs

Out-colourings of Digraphs Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.

More information

A bad example for the iterative rounding method for mincost k-connected spanning subgraphs

A bad example for the iterative rounding method for mincost k-connected spanning subgraphs A bad example for the iterative rounding method for mincost k-connected spanning subgraphs Ashkan Aazami a, Joseph Cheriyan b,, Bundit Laekhanukit c a Dept. of Comb. & Opt., U. Waterloo, Waterloo ON Canada

More information

ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES

ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES SANTOSH N. KABADI AND ABRAHAM P. PUNNEN Abstract. Polynomially testable characterization of cost matrices associated

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information

A Randomized Rounding Approach to the Traveling Salesman Problem

A Randomized Rounding Approach to the Traveling Salesman Problem A Randomized Rounding Approach to the Traveling Salesman Problem Shayan Oveis Gharan Amin Saberi. Mohit Singh. Abstract For some positive constant ɛ 0, we give a ( 3 2 ɛ 0)-approximation algorithm for

More information

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs

Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Induced Subgraph Isomorphism on proper interval and bipartite permutation graphs Pinar Heggernes Pim van t Hof Daniel Meister Yngve Villanger Abstract Given two graphs G and H as input, the Induced Subgraph

More information

Laplacian Integral Graphs with Maximum Degree 3

Laplacian Integral Graphs with Maximum Degree 3 Laplacian Integral Graphs with Maximum Degree Steve Kirkland Department of Mathematics and Statistics University of Regina Regina, Saskatchewan, Canada S4S 0A kirkland@math.uregina.ca Submitted: Nov 5,

More information

On shredders and vertex connectivity augmentation

On shredders and vertex connectivity augmentation On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the

More information

Lecture 5 Polynomial Identity Testing

Lecture 5 Polynomial Identity Testing Lecture 5 Polynomial Identity Testing Michael P. Kim 18 April 2017 1 Outline and Motivation In this lecture we will cover a fundamental problem in complexity theory polynomial identity testing (PIT). We

More information

Containment restrictions

Containment restrictions Containment restrictions Tibor Szabó Extremal Combinatorics, FU Berlin, WiSe 207 8 In this chapter we switch from studying constraints on the set operation intersection, to constraints on the set relation

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

4 Packing T-joins and T-cuts

4 Packing T-joins and T-cuts 4 Packing T-joins and T-cuts Introduction Graft: A graft consists of a connected graph G = (V, E) with a distinguished subset T V where T is even. T-cut: A T -cut of G is an edge-cut C which separates

More information

Algebraic Algorithms for Linear Matroid Parity Problems

Algebraic Algorithms for Linear Matroid Parity Problems Algebraic Algorithms for Linear Matroid Parity Problems Ho Yee Cheung, Lap Chi Lau, Kai Man Leung The Chinese University of Hong Kong Abstract We present fast and simple algebraic algorithms for the linear

More information

THE COMPLEXITY OF DISSOCIATION SET PROBLEMS IN GRAPHS. 1. Introduction

THE COMPLEXITY OF DISSOCIATION SET PROBLEMS IN GRAPHS. 1. Introduction THE COMPLEXITY OF DISSOCIATION SET PROBLEMS IN GRAPHS YURY ORLOVICH, ALEXANDRE DOLGUI, GERD FINKE, VALERY GORDON, FRANK WERNER Abstract. A subset of vertices in a graph is called a dissociation set if

More information

arxiv: v1 [cs.dm] 26 Apr 2010

arxiv: v1 [cs.dm] 26 Apr 2010 A Simple Polynomial Algorithm for the Longest Path Problem on Cocomparability Graphs George B. Mertzios Derek G. Corneil arxiv:1004.4560v1 [cs.dm] 26 Apr 2010 Abstract Given a graph G, the longest path

More information

Root systems and optimal block designs

Root systems and optimal block designs Root systems and optimal block designs Peter J. Cameron School of Mathematical Sciences Queen Mary, University of London Mile End Road London E1 4NS, UK p.j.cameron@qmul.ac.uk Abstract Motivated by a question

More information

A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo

A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo A lower bound for the Laplacian eigenvalues of a graph proof of a conjecture by Guo A. E. Brouwer & W. H. Haemers 2008-02-28 Abstract We show that if µ j is the j-th largest Laplacian eigenvalue, and d

More information

Restricted b-matchings in degree-bounded graphs

Restricted b-matchings in degree-bounded graphs Egerváry Research Group on Combinatorial Optimization Technical reports TR-009-1. Published by the Egerváry Research Group, Pázmány P. sétány 1/C, H1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

MINIMALLY NON-PFAFFIAN GRAPHS

MINIMALLY NON-PFAFFIAN GRAPHS MINIMALLY NON-PFAFFIAN GRAPHS SERGUEI NORINE AND ROBIN THOMAS Abstract. We consider the question of characterizing Pfaffian graphs. We exhibit an infinite family of non-pfaffian graphs minimal with respect

More information

K 4 -free graphs with no odd holes

K 4 -free graphs with no odd holes K 4 -free graphs with no odd holes Maria Chudnovsky 1 Columbia University, New York NY 10027 Neil Robertson 2 Ohio State University, Columbus, Ohio 43210 Paul Seymour 3 Princeton University, Princeton

More information

The matrix approach for abstract argumentation frameworks

The matrix approach for abstract argumentation frameworks The matrix approach for abstract argumentation frameworks Claudette CAYROL, Yuming XU IRIT Report RR- -2015-01- -FR February 2015 Abstract The matrices and the operation of dual interchange are introduced

More information

Berge Trigraphs. Maria Chudnovsky 1 Princeton University, Princeton NJ March 15, 2004; revised December 2, Research Fellow.

Berge Trigraphs. Maria Chudnovsky 1 Princeton University, Princeton NJ March 15, 2004; revised December 2, Research Fellow. Berge Trigraphs Maria Chudnovsky 1 Princeton University, Princeton NJ 08544 March 15, 2004; revised December 2, 2005 1 This research was partially conducted during the period the author served as a Clay

More information

Extremal Graphs Having No Stable Cutsets

Extremal Graphs Having No Stable Cutsets Extremal Graphs Having No Stable Cutsets Van Bang Le Institut für Informatik Universität Rostock Rostock, Germany le@informatik.uni-rostock.de Florian Pfender Department of Mathematics and Statistics University

More information

3. Linear Programming and Polyhedral Combinatorics

3. Linear Programming and Polyhedral Combinatorics Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans April 5, 2017 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the introductory

More information

The chromatic number of ordered graphs with constrained conflict graphs

The chromatic number of ordered graphs with constrained conflict graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 69(1 (017, Pages 74 104 The chromatic number of ordered graphs with constrained conflict graphs Maria Axenovich Jonathan Rollin Torsten Ueckerdt Department

More information

SDP Relaxations for MAXCUT

SDP Relaxations for MAXCUT SDP Relaxations for MAXCUT from Random Hyperplanes to Sum-of-Squares Certificates CATS @ UMD March 3, 2017 Ahmed Abdelkader MAXCUT SDP SOS March 3, 2017 1 / 27 Overview 1 MAXCUT, Hardness and UGC 2 LP

More information

The cocycle lattice of binary matroids

The cocycle lattice of binary matroids Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*

More information

Lecture 7: Schwartz-Zippel Lemma, Perfect Matching. 1.1 Polynomial Identity Testing and Schwartz-Zippel Lemma

Lecture 7: Schwartz-Zippel Lemma, Perfect Matching. 1.1 Polynomial Identity Testing and Schwartz-Zippel Lemma CSE 521: Design and Analysis of Algorithms I Winter 2017 Lecture 7: Schwartz-Zippel Lemma, Perfect Matching Lecturer: Shayan Oveis Gharan 01/30/2017 Scribe: Philip Cho Disclaimer: These notes have not

More information

Random Lifts of Graphs

Random Lifts of Graphs 27th Brazilian Math Colloquium, July 09 Plan of this talk A brief introduction to the probabilistic method. A quick review of expander graphs and their spectrum. Lifts, random lifts and their properties.

More information

List of Theorems. Mat 416, Introduction to Graph Theory. Theorem 1 The numbers R(p, q) exist and for p, q 2,

List of Theorems. Mat 416, Introduction to Graph Theory. Theorem 1 The numbers R(p, q) exist and for p, q 2, List of Theorems Mat 416, Introduction to Graph Theory 1. Ramsey s Theorem for graphs 8.3.11. Theorem 1 The numbers R(p, q) exist and for p, q 2, R(p, q) R(p 1, q) + R(p, q 1). If both summands on the

More information

An approximate version of Hadwiger s conjecture for claw-free graphs

An approximate version of Hadwiger s conjecture for claw-free graphs An approximate version of Hadwiger s conjecture for claw-free graphs Maria Chudnovsky Columbia University, New York, NY 10027, USA and Alexandra Ovetsky Fradkin Princeton University, Princeton, NJ 08544,

More information

Computability and Complexity Theory: An Introduction

Computability and Complexity Theory: An Introduction Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given

More information

Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version.

Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version. Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version. Part II. Nontrivial strip-structures Maria Chudnovsky Department of Industrial Engineering and Operations Research Columbia

More information

GRAPHS WITH MAXIMAL INDUCED MATCHINGS OF THE SAME SIZE. 1. Introduction

GRAPHS WITH MAXIMAL INDUCED MATCHINGS OF THE SAME SIZE. 1. Introduction GRAPHS WITH MAXIMAL INDUCED MATCHINGS OF THE SAME SIZE PHILIPPE BAPTISTE, MIKHAIL Y. KOVALYOV, YURY L. ORLOVICH, FRANK WERNER, IGOR E. ZVEROVICH Abstract. A graph is well-indumatched if all its maximal

More information

6.046 Recitation 11 Handout

6.046 Recitation 11 Handout 6.046 Recitation 11 Handout May 2, 2008 1 Max Flow as a Linear Program As a reminder, a linear program is a problem that can be written as that of fulfilling an objective function and a set of constraints

More information

Lecture 1 : Probabilistic Method

Lecture 1 : Probabilistic Method IITM-CS6845: Theory Jan 04, 01 Lecturer: N.S.Narayanaswamy Lecture 1 : Probabilistic Method Scribe: R.Krithika The probabilistic method is a technique to deal with combinatorial problems by introducing

More information

Spectrally arbitrary star sign patterns

Spectrally arbitrary star sign patterns Linear Algebra and its Applications 400 (2005) 99 119 wwwelseviercom/locate/laa Spectrally arbitrary star sign patterns G MacGillivray, RM Tifenbach, P van den Driessche Department of Mathematics and Statistics,

More information

Properties of θ-super positive graphs

Properties of θ-super positive graphs Properties of θ-super positive graphs Cheng Yeaw Ku Department of Mathematics, National University of Singapore, Singapore 117543 matkcy@nus.edu.sg Kok Bin Wong Institute of Mathematical Sciences, University

More information

Coloring square-free Berge graphs

Coloring square-free Berge graphs Coloring square-free Berge graphs Maria Chudnovsky Irene Lo Frédéric Maffray Nicolas Trotignon Kristina Vušković September 30, 2015 Abstract We consider the class of Berge graphs that do not contain a

More information

Independent Transversal Dominating Sets in Graphs: Complexity and Structural Properties

Independent Transversal Dominating Sets in Graphs: Complexity and Structural Properties Filomat 30:2 (2016), 293 303 DOI 10.2298/FIL1602293A Published by Faculty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Independent Transversal Dominating

More information

1 Counting spanning trees: A determinantal formula

1 Counting spanning trees: A determinantal formula Math 374 Matrix Tree Theorem Counting spanning trees: A determinantal formula Recall that a spanning tree of a graph G is a subgraph T so that T is a tree and V (G) = V (T ) Question How many distinct

More information

4-coloring P 6 -free graphs with no induced 5-cycles

4-coloring P 6 -free graphs with no induced 5-cycles 4-coloring P 6 -free graphs with no induced 5-cycles Maria Chudnovsky Department of Mathematics, Princeton University 68 Washington Rd, Princeton NJ 08544, USA mchudnov@math.princeton.edu Peter Maceli,

More information

The Interlace Polynomial of Graphs at 1

The Interlace Polynomial of Graphs at 1 The Interlace Polynomial of Graphs at 1 PN Balister B Bollobás J Cutler L Pebody July 3, 2002 Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152 USA Abstract In this paper we

More information

9 - The Combinatorial Nullstellensatz

9 - The Combinatorial Nullstellensatz 9 - The Combinatorial Nullstellensatz Jacques Verstraëte jacques@ucsd.edu Hilbert s nullstellensatz says that if F is an algebraically closed field and f and g 1, g 2,..., g m are polynomials in F[x 1,

More information

Bichain graphs: geometric model and universal graphs

Bichain graphs: geometric model and universal graphs Bichain graphs: geometric model and universal graphs Robert Brignall a,1, Vadim V. Lozin b,, Juraj Stacho b, a Department of Mathematics and Statistics, The Open University, Milton Keynes MK7 6AA, United

More information

The Matrix-Tree Theorem

The Matrix-Tree Theorem The Matrix-Tree Theorem Christopher Eur March 22, 2015 Abstract: We give a brief introduction to graph theory in light of linear algebra. Our results culminates in the proof of Matrix-Tree Theorem. 1 Preliminaries

More information

Advanced Topics in Discrete Math: Graph Theory Fall 2010

Advanced Topics in Discrete Math: Graph Theory Fall 2010 21-801 Advanced Topics in Discrete Math: Graph Theory Fall 2010 Prof. Andrzej Dudek notes by Brendan Sullivan October 18, 2010 Contents 0 Introduction 1 1 Matchings 1 1.1 Matchings in Bipartite Graphs...................................

More information

The complexity of counting graph homomorphisms

The complexity of counting graph homomorphisms The complexity of counting graph homomorphisms Martin Dyer and Catherine Greenhill Abstract The problem of counting homomorphisms from a general graph G to a fixed graph H is a natural generalisation of

More information

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra. DS-GA 1002 Lecture notes 0 Fall 2016 Linear Algebra These notes provide a review of basic concepts in linear algebra. 1 Vector spaces You are no doubt familiar with vectors in R 2 or R 3, i.e. [ ] 1.1

More information

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems

Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive

More information

GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017)

GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) C. Croitoru croitoru@info.uaic.ro FII November 12, 2017 1 / 33 OUTLINE Matchings Analytical Formulation of the Maximum Matching Problem Perfect Matchings

More information

Lecture 22: Counting

Lecture 22: Counting CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.

More information

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization

The Complexity of Maximum. Matroid-Greedoid Intersection and. Weighted Greedoid Maximization Department of Computer Science Series of Publications C Report C-2004-2 The Complexity of Maximum Matroid-Greedoid Intersection and Weighted Greedoid Maximization Taneli Mielikäinen Esko Ukkonen University

More information

Constructive proof of deficiency theorem of (g, f)-factor

Constructive proof of deficiency theorem of (g, f)-factor SCIENCE CHINA Mathematics. ARTICLES. doi: 10.1007/s11425-010-0079-6 Constructive proof of deficiency theorem of (g, f)-factor LU HongLiang 1, & YU QingLin 2 1 Center for Combinatorics, LPMC, Nankai University,

More information

Asymptotically optimal induced universal graphs

Asymptotically optimal induced universal graphs Asymptotically optimal induced universal graphs Noga Alon Abstract We prove that the minimum number of vertices of a graph that contains every graph on vertices as an induced subgraph is (1+o(1))2 ( 1)/2.

More information

Strongly Regular Decompositions of the Complete Graph

Strongly Regular Decompositions of the Complete Graph Journal of Algebraic Combinatorics, 17, 181 201, 2003 c 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Strongly Regular Decompositions of the Complete Graph EDWIN R. VAN DAM Edwin.vanDam@uvt.nl

More information

Symmetric 0-1 matrices with inverses having two distinct values and constant diagonal

Symmetric 0-1 matrices with inverses having two distinct values and constant diagonal Symmetric 0-1 matrices with inverses having two distinct values and constant diagonal Wayne Barrett Department of Mathematics, Brigham Young University, Provo, UT, 84602, USA Steve Butler Dept. of Mathematics,

More information

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of

More information

Facets for Node-Capacitated Multicut Polytopes from Path-Block Cycles with Two Common Nodes

Facets for Node-Capacitated Multicut Polytopes from Path-Block Cycles with Two Common Nodes Facets for Node-Capacitated Multicut Polytopes from Path-Block Cycles with Two Common Nodes Michael M. Sørensen July 2016 Abstract Path-block-cycle inequalities are valid, and sometimes facet-defining,

More information

Counting bases of representable matroids

Counting bases of representable matroids Counting bases of representable matroids Michael Snook School of Mathematics, Statistics and Operations Research Victoria University of Wellington Wellington, New Zealand michael.snook@msor.vuw.ac.nz Submitted:

More information

Matching Polynomials of Graphs

Matching Polynomials of Graphs Spectral Graph Theory Lecture 25 Matching Polynomials of Graphs Daniel A Spielman December 7, 2015 Disclaimer These notes are not necessarily an accurate representation of what happened in class The notes

More information

1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D).

1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D). 1.3. VERTEX DEGREES 11 1.3 Vertex Degrees Vertex Degree for Undirected Graphs: Let G be an undirected graph and x V (G). The degree d G (x) of x in G: the number of edges incident with x, each loop counting

More information

Convex and Semidefinite Programming for Approximation

Convex and Semidefinite Programming for Approximation Convex and Semidefinite Programming for Approximation We have seen linear programming based methods to solve NP-hard problems. One perspective on this is that linear programming is a meta-method since

More information

Math 775 Homework 1. Austin Mohr. February 9, 2011

Math 775 Homework 1. Austin Mohr. February 9, 2011 Math 775 Homework 1 Austin Mohr February 9, 2011 Problem 1 Suppose sets S 1, S 2,..., S n contain, respectively, 2, 3,..., n 1 elements. Proposition 1. The number of SDR s is at least 2 n, and this bound

More information

ACO Comprehensive Exam October 14 and 15, 2013

ACO Comprehensive Exam October 14 and 15, 2013 1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for

More information

3. Linear Programming and Polyhedral Combinatorics

3. Linear Programming and Polyhedral Combinatorics Massachusetts Institute of Technology 18.433: Combinatorial Optimization Michel X. Goemans February 28th, 2013 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the introductory

More information

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source

More information

Painting Squares in 2 1 Shades

Painting Squares in 2 1 Shades Painting Squares in 1 Shades Daniel W. Cranston Landon Rabern May 1, 014 Abstract Cranston and Kim conjectured that if G is a connected graph with maximum degree and G is not a Moore Graph, then χ l (G

More information

Extremal H-colorings of graphs with fixed minimum degree

Extremal H-colorings of graphs with fixed minimum degree Extremal H-colorings of graphs with fixed minimum degree John Engbers July 18, 2014 Abstract For graphs G and H, a homomorphism from G to H, or H-coloring of G, is a map from the vertices of G to the vertices

More information

Lecture 24: Element-wise Sampling of Graphs and Linear Equation Solving. 22 Element-wise Sampling of Graphs and Linear Equation Solving

Lecture 24: Element-wise Sampling of Graphs and Linear Equation Solving. 22 Element-wise Sampling of Graphs and Linear Equation Solving Stat260/CS294: Randomized Algorithms for Matrices and Data Lecture 24-12/02/2013 Lecture 24: Element-wise Sampling of Graphs and Linear Equation Solving Lecturer: Michael Mahoney Scribe: Michael Mahoney

More information

Even Pairs and Prism Corners in Square-Free Berge Graphs

Even Pairs and Prism Corners in Square-Free Berge Graphs Even Pairs and Prism Corners in Square-Free Berge Graphs Maria Chudnovsky Princeton University, Princeton, NJ 08544 Frédéric Maffray CNRS, Laboratoire G-SCOP, University of Grenoble-Alpes, France Paul

More information

Sergey Norin Department of Mathematics and Statistics McGill University Montreal, Quebec H3A 2K6, Canada. and

Sergey Norin Department of Mathematics and Statistics McGill University Montreal, Quebec H3A 2K6, Canada. and NON-PLANAR EXTENSIONS OF SUBDIVISIONS OF PLANAR GRAPHS Sergey Norin Department of Mathematics and Statistics McGill University Montreal, Quebec H3A 2K6, Canada and Robin Thomas 1 School of Mathematics

More information

Bounds for the Zero Forcing Number of Graphs with Large Girth

Bounds for the Zero Forcing Number of Graphs with Large Girth Theory and Applications of Graphs Volume 2 Issue 2 Article 1 2015 Bounds for the Zero Forcing Number of Graphs with Large Girth Randy Davila Rice University, rrd32@txstate.edu Franklin Kenter Rice University,

More information

Orientations of Simplices Determined by Orderings on the Coordinates of their Vertices. September 30, 2018

Orientations of Simplices Determined by Orderings on the Coordinates of their Vertices. September 30, 2018 Orientations of Simplices Determined by Orderings on the Coordinates of their Vertices Emeric Gioan 1 Kevin Sol 2 Gérard Subsol 1 September 30, 2018 arxiv:1602.01641v1 [cs.dm] 4 Feb 2016 Abstract Provided

More information